FiltersClear all
Consulting services results for Government
Showing results in consulting services.
All results
Introductory and Briefing to the Microsoft Copilots by Comtrade - 1 dayComtrade System IntegrationThis workshop is perfect for those looking for a complete guide to Microsoft Copilots (yes, all of them); You will gain all the knowledge you need to decide what Copilot is right for you and why.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Workplace Analytics
1 out of 6
Symity 5 Day Teams Premium PilotSYMITY, part of Charterhouse Voice & Data LtdMicrosoft Teams Premium elevates your meeting experience. This pilot explains the key features of Microsoft Teams Premium and provides you with hands on experience with a 30 day trial.
+3
Applicable to:
Adoption & Change Management
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Windows 365 ImplementationHTGA 5-7 day process where selected users will pilot Windows 365 to demonstrate the ease of provisioning and managing Windows 365 Cloud PCs, running Windows 11, with Microsoft Intune.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Mobile Device Management
3 out of 6
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITEDConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 6
DeviceGuard Managed ServiceCWSIOur experts manage and secure your endpoints, proactively detecting vulnerabilities, apply patches, and enforce encryption protocols to keep your business and its data free from prying eyes.
+3
Applicable to:
Device Deployment & Management
Frontline Workers
Mobile Device Management
5 out of 6
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data LtdWhether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 6